kyxiaxiang / SafetasklistLinks
Help red teams find opsec processes during engagements
☆42Updated 9 months ago
Alternatives and similar repositories for Safetasklist
Users that are interested in Safetasklist are comparing it to the libraries listed below
Sorting:
- A Simple PoC☆21Updated last year
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆100Updated 2 months ago
- Repository of scripts from my blog post on bypassing the YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellco…☆41Updated 10 months ago
- Silently Install Chrome Extension For Persistence☆92Updated last year
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆53Updated 2 years ago
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆174Updated last month
- A BOF to create a scheduled task using a COM object.☆13Updated 9 months ago
- Use the Netlogon Remote Protocol (MS-NRPC) to dump the target hash.☆58Updated 6 months ago
- Evasive loader to bypass static detection☆58Updated last year
- PoC exploit for the vulnerable WatchDog Anti-Malware driver (amsdk.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆46Updated this week
- Test bench lab for Shellcode Obfuscation☆29Updated last week
- 一个普通的BOF用来BypassUAC☆22Updated last year
- ☆57Updated last year
- A BOF/COFF loader implemented in Go and CGO.☆22Updated last year
- Golang implementation of @CCob's C# ThreadlessInject☆31Updated last year
- replace the shellcode chatacters so that reduce the entropy☆17Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses LogonUserSSPI API to perform kerberos-based password spray☆47Updated 2 years ago
- CVE-2024-40711-exp☆42Updated 10 months ago
- Self Cleanup in post-ex job☆59Updated last year
- Homemade Aggressor scripts kit for Cobalt Strike☆76Updated last month
- ☆81Updated last year
- ☆48Updated 4 months ago
- ☆42Updated last year
- Beacon Object File to delete token privileges and lower the integrity level to untrusted for a specified process☆45Updated 3 years ago
- An Exercice for Red Team to Reverse & Exploit, that's a valide BYOVD Killer, not HVCI Blocklisted, and not in LOLBIN☆30Updated last month
- POC tool to extract all persistent clipboard history data from clipboard service process memory☆48Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆17Updated 2 years ago
- Use Rust to implement some Red Team techniques :)☆13Updated 10 months ago
- Beacon Object File (BOF) Template☆55Updated 9 months ago
- This contains a number of examples demonstrating how to use callback functions in supported aggressor script functions☆35Updated 5 months ago